Chuck Leaver – Now Integrating Advanced Endpoint Products Into Existing Security Architectures Is Possible

Written By Roark Pollock And Presented By Ziften CEO Chuck Leaver

 

Security practitioners are by nature a careful lot. Cautiousness is a quality most folks likely have entering into this market given its mission, however it’s also undoubtedly a characteristic that is learned gradually. Ironically this holds true even when it pertains to adding additional security controls into an existing security architecture. While one might presume that more security is better security, experience teaches us that’s not always the case. There are actually many issues connected with releasing a brand-new security service. One that often shows up near the top of the list is how well a brand-new product integrates with other incumbent products.

Integration concerns can be found in numerous tastes. Most importantly, a new security control shouldn’t break anything. But additionally, brand-new security services need to willingly share risk intelligence and act on hazard intelligence gathered across a company’s entire security infrastructure. To put it simply, the brand-new security tools need to collaborate with the existing ecosystem of tools in place such that “1 + 1 = 3”. The last thing that many IT and security operations teams require is more siloed products/ tools.

At Ziften, this is why we’ve constantly focused on building and providing a completely open visibility architecture. Our company believe that any brand-new systems and security operations tools have to be developed with improved visibility and information sharing as key design requirements. However this isn’t a one-way street. Producing easy integrations requires innovation partnerships with market suppliers. We consider it our duty to deal with other innovation businesses to mutually integrate our products, thus making it easy on customers. Unfortunately, many suppliers still think that integration of security services, specifically brand-new endpoint security services is incredibly difficult. I hear the issue continuously in consumer discussions. But information is now appearing revealing this isn’t necessarily the case.

Current survey work by NSS Labs on “sophisticated endpoint” products, they report that Global 2000 clients based in the United States and Canada have been happily shocked with how well these types of services integrate into their existing security architectures. In accordance with the NSS research study titled “Advanced Endpoint Protection – Market Analysis and Survey Results CY2016”, which NSS subsequently presented in the BrightTalk webinar below, respondents that had actually already deployed advanced endpoint products were a lot more positive concerning their capability to integrate into already established security architectures than were participants that were still in the planning stages of acquiring these products.

Specifically, for participants that have currently released advanced endpoint services: they rank integration with existing security architectures as follows:

● Excellent 5.3 %
● Good 50.0 %
● Average 31.6 %
● Poor 13.2 %
● (Horrible) 0.0 %

Compare that to the more conservative responses from folks still in the planning stage:

● Excellent 0.0 %
● Good 39.3 %
● Average 42.9 %
● Poor 14.3 %
● (Horrible) 3.6 %

These reactions are motivating. Yes, as kept in mind, security folks tend to be pessimists, but in spite of low expectations respondents are reporting positive results when it comes to integration experiences. In fact, Ziften customers generally show the same initial low expectations when we initially talk about integrating Ziften products into their existing environment of products. But in the end, consumers are wowed by how simple it is to share info with Ziften services and their already established infrastructure.

These survey results will hopefully help reduce issues as newer product adopters might check out and depend on peer suggestions before making purchase choices. Early mainstream adopters are clearly having success releasing these products which will ideally help to reduce the natural cautiousness of the real mainstream.

Definitely, there is considerable distinction with services in the space, and companies must continue to carry out proper due diligence in comprehending how and where services integrate into their wider security architectures. But, fortunately is that there are products not just satisfying the needs of customers, however really out performing their initial expectations.

 

~leaverchuck1


No Responses Yet to “Chuck Leaver – Now Integrating Advanced Endpoint Products Into Existing Security Architectures Is Possible”

Leave a Reply